8
Research Article Healthcare Data Security Technology: HIPAA Compliance Scholas Mbonihankuye , 1 Athanase Nkunzimana, 2,3 and Ange Ndagijimana 1 1 Department of Computer Science and Technology, Nanjing University of Information Science and Technology, Nanjing 210044, China 2 Department of Geographical Sciences, Nanjing University of Information Science and Technology, Nanjing 210044, China 3 Department of Geography, University of Burundi, P. O. Box 5142, Bujumbura, Burundi Correspondence should be addressed to Scholas Mbonihankuye; [email protected] Received 22 June 2019; Accepted 5 September 2019; Published 17 October 2019 Guest Editor: Iv´ an Garc´ ıa-Magariño Copyright © 2019 Scholas Mbonihankuye et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is more important than ever to the healthcare industry and in world in general. e number of data breaches compromising confidential healthcare data is on the rise. For data security, cloud computing is very useful for securing data. Due to data storage issue, there is a need to use the electronic communication, and a number of methods have been developed for data security technology. Health Insurance Portability and Accountability Act (HIPAA) is one of the methods that can help in healthcare research. On stored database of patient in hospital or clinic, we can develop a conservational and analytical method so as to keep the medical records of the patients in a well-preserved and adequate environment. e method includes the improvement of working possibilities by delivering all the details necessary for the patient. All the information must be identified clearly. e protection of the privacy of the patients and the security of their information are the most imperative obstacles to obtain their intakes when considering the adoption of useful health data in the electronic field of healthcare industries. 1. Introduction Health is very important and concerns all living things including human beings, the plants, the animals, the space, and the environment. e safety issue is becoming of more concern and concerns the security for all. In order to conduct a study on the technology that one can use to handle healthcare issues, it is important to look for all means that can enable to create a livable environment where people and surrounding live healthy and in harmony. e risk man- agement determines the precautions to be taken regarding the nature of the data and surrounding environment. During the data treatment process, it is suggested to take all the precautions so as to avoid all the risks and preserve the data security as stated in the Article 34 of the Law known as “Informatics and Freedoms.” e research done by European regulation 2016/679 on 27 April 2016 (known as “General Data Protection Regu- lations” or RGPD) specifies that the protection of personal data requires taking appropriate technical and organiza- tional measures to ensure level of safety appropriate to the risk and security of health care of a patient [1, 2]. Communication is a key element in the construction of the caregiver-groomed relationship. e lack of commu- nication has a direct impact on the quality and safety of the patients. e literature is abundant on this subject, on the one hand to show that the lack of communication is one of the major causes of EIAS and on the other hand to underline the difficulties of patients to understand the medical ex- planations. ese difficulties of understanding increase the mortality rate. Multiple actions are being developed to this effect, particularly within the framework of the National Patient Safety Program (PNSP) to improve patient safety for health professionals and users. Such an approach allows for objective decision making and the determination of mea- sures strictly necessary and appropriate to the context. However, it is sometimes difficult, when you are not familiar with these methods, to implement such an approach and to Hindawi Wireless Communications and Mobile Computing Volume 2019, Article ID 1927495, 7 pages https://doi.org/10.1155/2019/1927495

Research Article - Hindawi Publishing Corporationdownloads.hindawi.com/journals/wcmc/2019/1927495.pdfrisk and security of health care of a patient [1, 2]. Communication is a key element

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Research Article - Hindawi Publishing Corporationdownloads.hindawi.com/journals/wcmc/2019/1927495.pdfrisk and security of health care of a patient [1, 2]. Communication is a key element

Research ArticleHealthcare Data Security Technology: HIPAA Compliance

Scholas Mbonihankuye ,1 Athanase Nkunzimana,2,3 and Ange Ndagijimana1

1Department of Computer Science and Technology, Nanjing University of Information Science and Technology,Nanjing 210044, China2Department of Geographical Sciences, Nanjing University of Information Science and Technology, Nanjing 210044, China3Department of Geography, University of Burundi, P. O. Box 5142, Bujumbura, Burundi

Correspondence should be addressed to Scholas Mbonihankuye; [email protected]

Received 22 June 2019; Accepted 5 September 2019; Published 17 October 2019

Guest Editor: Ivan Garcıa-Magariño

Copyright © 2019 ScholasMbonihankuye et al.�is is an open access article distributed under the Creative Commons AttributionLicense, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work isproperly cited.

Information technology (IT) plays an increasingly important and prominent role in the health sector. Data security is moreimportant than ever to the healthcare industry and in world in general. �e number of data breaches compromising con�dentialhealthcare data is on the rise. For data security, cloud computing is very useful for securing data. Due to data storage issue, there isa need to use the electronic communication, and a number of methods have been developed for data security technology. HealthInsurance Portability and Accountability Act (HIPAA) is one of the methods that can help in healthcare research. On storeddatabase of patient in hospital or clinic, we can develop a conservational and analytical method so as to keep the medical records ofthe patients in a well-preserved and adequate environment. �e method includes the improvement of working possibilities bydelivering all the details necessary for the patient. All the information must be identi�ed clearly. �e protection of the privacy ofthe patients and the security of their information are the most imperative obstacles to obtain their intakes when considering theadoption of useful health data in the electronic �eld of healthcare industries.

1. Introduction

Health is very important and concerns all living thingsincluding human beings, the plants, the animals, the space,and the environment. �e safety issue is becoming of moreconcern and concerns the security for all. In order toconduct a study on the technology that one can use to handlehealthcare issues, it is important to look for all means thatcan enable to create a livable environment where people andsurrounding live healthy and in harmony. �e risk man-agement determines the precautions to be taken regardingthe nature of the data and surrounding environment. Duringthe data treatment process, it is suggested to take all theprecautions so as to avoid all the risks and preserve the datasecurity as stated in the Article 34 of the Law known as“Informatics and Freedoms.”

�e research done by European regulation 2016/679 on27 April 2016 (known as “General Data Protection Regu-lations” or RGPD) speci�es that the protection of personal

data requires taking appropriate technical and organiza-tional measures to ensure level of safety appropriate to therisk and security of health care of a patient [1, 2].

Communication is a key element in the construction ofthe caregiver-groomed relationship. �e lack of commu-nication has a direct impact on the quality and safety of thepatients. �e literature is abundant on this subject, on theone hand to show that the lack of communication is one ofthe major causes of EIAS and on the other hand to underlinethe di¢culties of patients to understand the medical ex-planations. �ese di¢culties of understanding increase themortality rate. Multiple actions are being developed to thise¤ect, particularly within the framework of the NationalPatient Safety Program (PNSP) to improve patient safety forhealth professionals and users. Such an approach allows forobjective decision making and the determination of mea-sures strictly necessary and appropriate to the context.However, it is sometimes di¢cult, when you are not familiarwith these methods, to implement such an approach and to

HindawiWireless Communications and Mobile ComputingVolume 2019, Article ID 1927495, 7 pageshttps://doi.org/10.1155/2019/1927495

Page 2: Research Article - Hindawi Publishing Corporationdownloads.hindawi.com/journals/wcmc/2019/1927495.pdfrisk and security of health care of a patient [1, 2]. Communication is a key element

ensure that the minimum has been implemented. In order todevelop the field of data security policies, it is of highconcern to know how to store and secure the data to avoidany losses. -is requires to have enough knowledge aboutdata security policies.

Main significance of our study is the influence of thediffusion of digital tools: dematerialization and in-dividualization of tasks, increase of mobile work, secure dataon physical and space, aspiration or injunction to autonomy,porosity of times of pro/personal life, and expansion of thecompany or enterprise. In previous years, the data man-agement in health care was based on the security technologyto support decision makers to establish a good data controland management. Many of these sources showed that in-cluding hospital information systems and medical servicefacture systems may be valid to date. -e debate regardingthe privacy of medical records has been sharpened by severallong-term trends. Achieving consensus regarding safeguardsfor an information system, among different stakeholders inan organization, has become more difficult than solvingmany technical problems that might arise [3]. -ey arerushing headlong into adopting IT without carefully plan-ning and understanding the security concerns, which createsfuture problems [4, 5]. -e impacts of security breaches ofcompany protocols that inadequately protect stored recordsare much more significant than paper records. However, astechnology progresses, the potential for more intrusions intopersonal medical records will grow, particularly in the areaof DNA testing. -e potential use of DNA test results byinsurers and employers to exclude “undesirables” from riskpools is becoming more and more evident.

1.1. Objective. -e HIS is a system that aims to provideinternal and external communication among healthcareproviders. Hospital Information Systems provide a commonsource of information about a patient’s health history. -esystem has to keep data in a secure place and control whocan reach the data in certain circumstances.

-ese systems enhance the ability of healthcare pro-fessionals to coordinate care by providing a patient’s healthinformation and visit history at the place and time that it isneeded.

-e originality of HIPAA compliance is that it is amethod very secure of patient data and privacy, especiallyadoption of electronic healthcare records. As the data havedifferent formats, the HIPAA enables to create a good formatwhich is appropriate to facilitate data access and datacontrol.

1.2. Literature Review. -e article written by Dumez andMinvielle was found to be very interesting and innovativesince it focused on health-proofed sanitary, in a contextwhere these concepts are still poorly defined. -e authorspropose a narrative review of the literature [5], with theobjective of analyzing the rebalancing of power in favor ofthe patient in the context of e-health. In the affiliation of theworks of Austin [6], the authors retain the performativity asa reading grid of the previous writings. -ey pay particular

attention to the notions of “performativity framed,” whichoccurs when a theory foresees the devices that will enable tomake the practices effective, and “performativity by over-flow,” which occurs when devices not anticipated by thetheory (in this case that of the health democracy) are put inplace and make the practices and performance in an un-expected way. -e analysis highlights four cases of en-gagement associated with e-health: the case ofcoconstruction between patients and health professionals;the case of coconstruction with increased expertise acquiredby patients via e-health; the case of autonomous manage-ment of the disease; and the status quo [7]. -e authorsaccurately underline the paradox of autonomous manage-ment of the disease where the patient-physician relationshipwould be rebalanced, as a result of the information thepatient acquires, whereas a new relationship of dependencyand asymmetry is created in relation to e-health operators,due to safety risks and abusive uses of data generated byconnected health.-e physical painfulness was strong beforethe introduction of the voice system.

-e analysis of the demographic data of the companyshows a constant renewal of the population of the orderpreparers. -ey are rarely held in employment beyond 5years of seniority. -e research done by Gomez and Che-vallet shows that half of the preparers hired around 2002,who were between 25 and 34 years old, are no longerpreparing in 2007 [8]. -ere were 57 recruitments on a totalworkforce of 110. A very young recruited population (51operators are between 18 and 24 years old), at 100% male,and without qualifications: the consecrated expression is tosay that one recruits a physical force, something all the easierin the context of a local employment pool [9, 10]. ARRA isanother method of record data with adoption electronic ofsystem for following meaning use policies. But it is notupgraded to facilitate the medical system store even if it has100% digital records, the health care still facing on penalties,and it is necessary to care about the privacy of patient's data.According to the study “Collaboration 2020: hype orcompetitive advantage?” of Johnson Controls published in2012, this is only the beginning of a profound evolution.According to Johnson Controls, collaboration platformsshould continue their development to accompany teamworkof collaborators located on different sites [11, 12]. -ecurrent abundance of IT implementation projects inhealthcare facilities in Europe, North America, and else-where in the world provides a privileged ground for studyinga range of research questions specific to the field of systemsof information. To name a few, these include organizationaland individual adoption, resistance to change, escalation ofprojects, strategic alignment, or the governance of in-formation systems.-ese issues are of particular importancein hospital organizations, which are one of the most complexorganizational models. -e development of the uses ofdigital health is currently being apprehended as a source oftransformation of the health system which can substantiallyreshape its functioning.

In order to present the strategic actions in promoting theevaluation of health technologies in developing andemerging countries with the security and to facilitate the

2 Wireless Communications and Mobile Computing

Page 3: Research Article - Hindawi Publishing Corporationdownloads.hindawi.com/journals/wcmc/2019/1927495.pdfrisk and security of health care of a patient [1, 2]. Communication is a key element

information decision making on the introduction of thehealth systems evaluation and make a good security of alldata. In the purpose of having better information for betterhealth system which sometimes intended to subset sec-ondary data in order to strengthen clinical care programs foreasy data working and management so as to secure thepopulation's health as shown in Table 1.

1.3. Interrupting the Kill Chain and Advanced Health Care toSecure Attacks. In the steps of kill chain, the series used byhackers or attackers to infiltrate a network may establishresidency in the network [13–15] and then extract datafrom the network of the data infected by virus. We haveunderstood that typical hierarchy of successful cyber at-tacks allows for better preparation to prevent the currentand future breaches. It is a concept related to the structureof an attack with the recent development of healthcaretechnology [16], consisting of target identification, forcedispatch to target, decision and order to attack the target,and finally the destruction of the target. Method kill chainhas defending or preemptive action. Defensible actions areas follows:

(i) Detect: determine whether an attacker is pokingaround

(ii) Deny: prevent information disclosure and un-authorized access

(iii) Disrupt: stop or change outbound traffic (toattacker)

(iv) Degrade: counterattack command and control(v) Deceive: interfere with command and control(vi) Contain: network segmentation changes

-ese sophisticated phishing attacks constantly result inthe most invasive and costly attacks on PHI and other sen-sitive information. In medical testing, some binary classifi-cations may find a false positive which results in some errorsin data reporting when the test result improperly indicatespresence of a condition such as a disease. It is called positivethough in reality it is not present; it sometimes contains false-negative error which improperly indicates the no presence ofdata condition and information security. -ere are two kindsof errors in a binary test [17]. False discovery rate (FDR) [18]is the probability that a “significant” result is a false positive.Advanced antispam software development continues to becrucial in preventing a typical attack, essentially makingantispam efforts the first line of defense. Advances in webfiltering have been developed as a vital “second line” of de-fense. -is involves preventing malicious links from leadingunknowing users to websites that have been compromised byattackers. Cyber kill chain reveals the stages of a cyber attack:from early reconnaissance to the goal of data exfiltration. -ekill chain can also be used as a management tool to helpcontinuously improve network defense. Driving forces ex-posing the need to act show us in Figure 1 that a moment hasnever been so conducive to the progression of the use of datafor the needs of the health system.

1.4. Increasing Volume of Digital Data. -ree definingproperties or dimensions are volume, variety, and velocityof big data (3Vs). Volume refers to the amount of data,variety refers to the number of types of data, and velocityrefers to the speed of data processing. According to the 3Vmodel, the challenges of big data management result fromthe expansion of all three properties, rather than just thevolume alone—the sheer amount of data to be managed.-e amount of accessible digital data increases rapidly.Data are made available by federals, provinces, territories,and governments. Billions of dollars are injected intovarious information technologies in order to support,deliver, and coordinate the health care. For example, morethan half of Canadian primary health care providers nowuse electronic medical records as part of their practice; thisis the research done for compared just over one-third in2009 (from 37% to 56% in 2012) [7]. -e implementationfound that the health initiative has to be improved and hasto enable the accessibility of electronic data. For example,electronic records at the point of service are increasinglybeing used in clinics, hospitals, and long-term care facil-ities. -e results obtained from diagnostic tests, includinglaboratory and diagnostic imaging reports, are also scannedin many services. Technological advances enable the col-lection of digitized data from sensory aids and surveillancedevices used in clinical and home settings, as well as newsources such as genomic analysis and social networkingsites.

1.5. Technological Advances. Many means are set out inorder to improve a suitable technology in health system,which is partly induced by technological advances. In-formation technology is now cheaper and more powerfulthan a few years ago and offers more ways of dealing withinformation from anywhere. -e new methods of analysis,the increased efficiency of the methods of treatment, andthe automation of current analytical analyses facilitate, forexample, the drawing of conclusions based on data onhealth and presentation of the information obtained in ausable format. -rough innovations, systems can learn,integrate predictive and real-time functions, and processunstructured data (as in natural language processing). -eresult found has shown that the current technology shouldbe better to deal with the project goals and check the clarityof the generated information by the digitalization of thehealth data useful for health security.

Technological advances will also contribute, throughthe strengthening of privacy and security options, to betteruse of health data in order to inform health system decisionmaking. -e electronic collection of personnal health in-formation is becoming more and more the preoccupationof policy makers or order to enhance tre security andprivacy of personnal data. Fortunately, users are beginningto have tools to ensure the safety guide of healthcare datasecurity and the secrecy of private healthcare information.-e design and implementation of appropriate security andprivacy measures are directly obtained from health

Wireless Communications and Mobile Computing 3

Page 4: Research Article - Hindawi Publishing Corporationdownloads.hindawi.com/journals/wcmc/2019/1927495.pdfrisk and security of health care of a patient [1, 2]. Communication is a key element

information systems which is an important condition thatmay appropriate the used data to lighten the decisionmaking on the healthcare system [13].

2. Standard Privacy of Selfhood IdentifiableInformation System for the HIPAAPrivacy Rule

HIPAA has detailed requirements for the protection andcon�dentiality of patient data and has changed the way ofhow health services, insurance, life sciences, and othercompanies view and address health problems, security, andcon�dentiality. From a technology perspective, HIPAAcovers a wide range of areas including websites, medicaldevices, electronic medical records, and medical imaging.A number of recent technology trends, including thesuccess of virtualization, cloud computing, devices, andmobile applications, have created new challenges forpayers and health service providers to comply with HIPAA.Solutions can help companies meet HIPAA requirementsas well as improve their overall security and risk man-agement situation. �ese solutions provide e¤ective

protection against threats in customer premises, in vir-tualized environments and on mobile devices. It includes asummary of its impact on a number of technology areas, aswell as how trends such as cloud and mobility can a¤ectcompliance e¤orts. �is report also describes how currentsolutions can support companies in their e¤orts to complywith HIPAA today and individualism conception basedthe right to privacy in Insistence of idea secret, Concernhealthcare privacy, all person want to keep secret bydeveloping an area free from interference [14]. �e em-phasis is placed here on the dead which individual want todo selfhood. Liberty of health privacy con�ded withpersonal must do or not and knowledge access in health.�us allows to be conceived as a secret sphere of life fromwhich it is possible to dismiss the people that are notconcerned by the healthcare security �eld.�erefore, thesedi¤erent conceptions as well as the related criteria arepresented, in a �rst part, to delimit the right to privacy. Ina second part, it is a matter of establishing the scope of thesupervision exercised by the employer. �e analysis thenaims at the reasonable expectation of privacy of the em-ployee, the renunciation of the right to privacy, and the

Patient Hospital Security Network

Medicalapplicationproviders

Switch

Computer

Doctor

HIPAA

Figure 1: Information system.

Table 1: �reats and corresponding impacts.

Security concern/threat Impact

Information disclosure (loss of con�dentiality) Patient embarrassment; loss of trust; legalconsequences; loss of reputation

Withholding information or services (loss ofavailability)

Poor quality of services; insu¢cient patienttreatment; legal claims; �nancial impact

Modi�cation of information (loss of integrity) Insu¢cient or inappropriate patient treatment; poormanagement; �nancial loss

Table of repudiation Financial loss; lack of accountability; loss ofreputation

Nonauditability Poor management; inability to claim penalties andtake legal action

Loss of authenticity/validity Insu¢cient patient treatment

4 Wireless Communications and Mobile Computing

Page 5: Research Article - Hindawi Publishing Corporationdownloads.hindawi.com/journals/wcmc/2019/1927495.pdfrisk and security of health care of a patient [1, 2]. Communication is a key element

restriction of this right based on the criteria of rationalityand proportionality. -e NPP must inform patients of theuses and disclosure of PHI that the practice may make anddefine the patient’s rights to access and amend theirmedical information, and individuals have the right toreview and obtain a copy of their protected health in-formation [17, 18].

2.1. Administrative Safeguards. -ere is a requirement topractice, create, and maintain updated policies and theprocedures used to learn and help followers to maintain thesecurity of PHI.

Some examples of administrative safeguards include thefollowing:

(i) Acceptance use of policies that help trainers oremployees to have the right and responsibilities tohanding PHI.

(ii) Sanction policies are needed to discipline employeeswho violate HIPAA law.

(iii) Information access policies grant appropriate accessto computer workstation, health records andtransaction, and other programs or processes.

(iv) Security awareness training must be implemented.So, employees are trained and reminded of policiesand procedures relating to software updates, com-puter log monitoring, password updates, and otherkey security measures.

(v) Contingency planning, so adequate preparationpolicies and procedures are in place in order torespond to an emergency; if there is fire vandalismor other natural disasters, an incident and emer-gency response plan must be created, tested, andrevised and all critical activities must have a des-ignated owner.

2.2. Technical Safeguards. Practices need procedures and theright software and equipment to protect PHI. Practices mustimplement technical policies and procedures to allow access toany of those people who need access to do their jobs. Practicesshould incorporate encryption and decryption in backing up,restoring, and transmitting electronic patient information.Policies and procedures must be set up to destroy PHI when itis no longer necessary to fulfill a job or function.

2.2.1. Physical Safeguards. It must be implemented toprotect the location and devices within your practice. Facilityaccess controls must be created, and all access must bemonitored. It is important that you understand and monitorwho is accessing the practice, and security measures are putin place prior and after a potential incident. HIPAA requiresthat every practice designate a HIPAA security and HIPAAprivacy officer.

2.2.2. Security of Patient. -e patient’s safety is defined asreducing any risk of preventable harm to the patient. It has

the primary ambition to avoid any reversal of the benefit/riskto be treated [17]. An adverse event associated with care is anunexpected event that disrupts or delays the care process ordirectly impacts the patient in his or her health. -is event isa consequence of the acts of prevention, diagnosis, ortreatment. It deviates from the expected results or expec-tations of care and is not related to the natural evolution ofthe disease [18].-is adverse event can be severe (AES) as anunexpected death, a serious complication involving the vitalprognosis or permanent loss of a function that does notresult from the natural evolution of the disease. Technologysecurity officers are trained by many different organizationsas shown in Figure 2; it is a system with sans, Microsoft, andthe computer system industry.

2.2.3. Manage the Risk. A risk management approach aimsto ensure the safety of the patient and the care that is de-livered and in particular to reduce the risk of adverse eventsfor the patient and the severity of their consequences.

2.2.4. Undesirable Event. An adverse event associated withcare (EIAS) is an unexpected event that disrupts or delaysthe care process or directly impacts the patient in his or herhealth.-e development of a safety culture also goes throughthe formation of professionals. Teaching these concepts at anearly stage in the training of future professionals should be apriority. As such, the World Health Organization (WHO)has published a pedagogical guide for all health professionalsthat provides all the elements for teaching basic principlesand concepts of patient safety [19, 20].

3. Experiment and Validation

-e data used are from the University of Granada (UGR),collected by Oresti Bonas, Rfael Garcia, and Alejandro Saezon October 22, 2013. -e units of measurement are accel-eration (m/s2), gyroscope (deg/s), magnetic field (local), andECG (mV).

In Figure 3, it can be seen how the acceleration from thechest sensor is very high especially during the midtimemeasurement. -is means that it is not easy to handle suchbig data. Data mining is a goodmethod for extracting data toenable picking up data by category.

-e curve of electrocardiogram signal shows the vari-ation of the data about the record done when examining thepatient in the clinic service. In this case, it has been seen thatthe data must be very big, but it is necessary for savingbecause if the patient has a matter again, the hospital cantransfer the patient to other clinics, and they can find the lastresult from other clinics or hospitals that can easily enabledisease diagnostic.-e previous result output can used in theevaluation of the disease and therefore can be considered totake a decision whether to change examination or diagnosticmaterials. Figure 4 shows the histogram of magnetometerfrom the left-ankle sensor.

Figure 5 exhibits the curve of Gyro from the right-lower-arm sensor. Its response is quite different from the onepresented by the electrocardiogram signal in Figure 4. -e

Wireless Communications and Mobile Computing 5

Page 6: Research Article - Hindawi Publishing Corporationdownloads.hindawi.com/journals/wcmc/2019/1927495.pdfrisk and security of health care of a patient [1, 2]. Communication is a key element

Gyro from the right-lower-arm sensor exhibits a high vi-bration except at the maximum phase.

Figure 6 shows the histogram of magnetometer from theleft-ankle sensor that shows the movement on the left-ankle.It can be seen that the sensation is near zero varying from–100 to +100. -e main sensation is near zero with thehighest value observed at zero.

Figure 7 shows the histogram representing the magne-tometer from the right-lower-arm sensor which exhibitssimilar movement rate as the left-lower-arm sensor. How-ever, the magnitude is different. -e highest value is 2.5,whereas it was more than 4.5 in Figure 6.

Administrativesafeguard

Securitysafeguard

Technicalsafeguard

Physicalsafeguard

Figure 2: Process of HIPAA.

×104

Chest sensorChest sensorChest sesnor

–25

–20

–15

–10

–5

0

5

10

15

20

25

Mill

ivol

ts

2 4 6 80 12 14 1610Time (sec)

Figure 3: Acceleration from the chest sensor.

2 4 6 8 10 12 14 16 18×104

0Time (sec)

–8

–6

–4

–2

0

2

4

6

Mill

ivol

ts

Figure 4: Electrocardiogram signal.

×1042 4 6 8 10 12 14 16 180

Time (sec)

–2.5

–2

–1.5

–1

–0.5

0

0.5

1

1.5

2M

illiv

olts

Figure 5: Gyro from the right-lower-arm sensor.

×104

–300 –200 –100 0 100 200 300 400–4000

0.5

1

1.5

2

2.5

3

3.5

4

4.5

5

Figure 6: Magnetometer from the left-ankle sensor.

6 Wireless Communications and Mobile Computing

Page 7: Research Article - Hindawi Publishing Corporationdownloads.hindawi.com/journals/wcmc/2019/1927495.pdfrisk and security of health care of a patient [1, 2]. Communication is a key element

4. Conclusion

Information technology in health care is very important forpatient's life or for clients especially in the security of theirinformation. It can lead to tricky legal and ethical territoryfor mental health professionals. Sometimes, the patientcomes back for other treatments, and in that case, it is easy tofind his/her data, and it will facilitate to know how thedisease is evaluated One might feel as though he is walking afine jobs when trying to educate the potential clients andother practitioners of the services providing health data byimproving the experiences through social network and dataservice. It is not surprising to see that for anything related tohealth care, people are able to get it resolved online and cantruly feel secure enough by HIPAA compliance. Technologyis always evolving such as in positivity action or negativity,and with it, we can get some risks. We must know thatinsurance should not be your only risk management tool. Toprevent lawsuits in the first place, stay up to date on reg-ulations. It is suggested that if someone is not sure about thedata used, it is better to contact the secured data offered byindustries or professional association that has a good evo-lution in healthcare technology.

Data Availability

-e data used to support the findings of this study areavailable from the corresponding author upon request.

Conflicts of Interest

-e authors declare that they have no conflicts of interest.

References

[1] J. Lu, A. V. D. Bossche, and E. Campo, “An IEEE 802. 15. 4based adaptive communication protocol in wireless sensornetwork: application to monitoring the elderly at home,”Wireless Sensor Network, vol. 6, no. 9, pp. 192–204, 2014.

[2] K. Hill, How Target Figured Out a Teen Girl Was Pregnantbefore Her Father Did, Forbes, Jersey City, NJ, USA, 2012.

[3] G. Dhillon and J. Backhouse, “Technical opinion: informationsystem security management in the new millennium,”Communications of the ACM, vol. 43, no. 7, pp. 125–128, 2000.

[4] B. Data in Proceedings of the 5th International Conference onIntelligence Science and Big Data Engineering, IScIDE,vol. 9243, pp. 1–626, 2015.

[5] G. Pare, M.-C. Trudel, M. Jaana, and S. Kitsiou, “Synthesizinginformation systems knowledge: a typology of literature re-views,” Information & Management, vol. 52, no. 2,pp. 183–199, 2015.

[6] J. L. Austin, Philosophical Papers, Oxford University Press,Oxford, UK, 1961.

[7] M. Viceconti, P. Hunter, and R. Hose, “Big data, bigknowledge: big data for personalized healthcare,” IEEEJournal of Biomedical and Health Informatics, vol. 19, no. 4,pp. 1209–1215, 2015.

[8] P. Gomez and R. Chevallet, “Impacts des technologies del’information sur la sante au travail. Hypotheses et inter-pretations a partir d’une observation experimentale,” RevueFrançaise de Gestion, vol. 37, no. 214, pp. 107–125, 2011.

[9] A. Visvanathan, A. P. Gibb, and R. R. W. Brady, “Increasingclinical presence of mobile communication technology:avoiding the pitfalls,” Telemedicine and e-Health, vol. 17, no. 8,pp. 656–661, 2011.

[10] A. Appari and M. E. Johnson, “Information security andprivacy in healthcare: current state of research,” InternationalJournal of Internet and Enterprise Management, vol. 6, no. 4,pp. 279–314, 2010.

[11] R. Ologeanu-Taddei and G. Pare, “Technologies de l’infor-mation en sante: un regard innovant et pragmatique,”Systemes D’information & Management, vol. 22, no. 1, p. 3,2017.

[12] C. Diana, “How I learned to stop worrying and love thehackers,” Interactions, vol. 15, no. 2, pp. 46–49, 2008.

[13] Institut Canadien D’information sur la Sante, Une meilleure in-formation pour une meilleure sante: vision de l’utilisation desdonnees pour les besoins du systeme de sante au Canada, InstitutCanadien D’information sur la Sante, Ottawa, Canada, 2013.

[14] R. April and R. April, “General overview of standards forprivacy of individually identifiable health information,”Search, vol. 502, pp. 2002-2003, 2003.

[15] J. J. M. Seddon and W. L. Currie, “Cloud computing andtrans-border health data: unpacking US and EU healthcareregulation and compliance,” Health Policy and Technology,vol. 2, no. 4, pp. 229–241, 2013.

[16] M. Flyverbom, R. Deibert, and D.Matten, “-eGovernance ofdigital technology, big data, and the internet: new roles andresponsibilities for business,” Business & Society, vol. 58, no. 1,pp. 3–19, 2017.

[17] A. Bagula, “Applications of wireless sensor networks,”2012, http://wireless.ictp.it/wp-content/uploads/2012/02/WSN-Applications.pdf.

[18] Y. Weiss, A. Torralba, and R. Fergus, “Spectral hashing,” inProceedings of the Advances in Neural Information ProcessingSystems, pp.1753–1760, Vancouver, BC, Canada, December 2008.

[19] C. S. Kruse, B. Smith, H. Vanderlinden, and A. Nealand,“Security techniques for the electronic health records,”Journal of Medical Systems, vol. 41, no. 8, p. 127, 2017.

[20] L. Shi, M. Li, S. Yu, and J. Yuan, “BANA: body area networkauthentication exploiting channel characteristics,” IEEEJournal on Selected Areas in Communications, vol. 31, no. 9,pp. 1803–1816, 2013.

×104

0

0.5

1

1.5

2

2.5

–300 –200 –100 0 100 200 300 400–400

Figure 7: Magnetometer from the right-lower-arm sensor.

Wireless Communications and Mobile Computing 7

Page 8: Research Article - Hindawi Publishing Corporationdownloads.hindawi.com/journals/wcmc/2019/1927495.pdfrisk and security of health care of a patient [1, 2]. Communication is a key element

International Journal of

AerospaceEngineeringHindawiwww.hindawi.com Volume 2018

RoboticsJournal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Active and Passive Electronic Components

VLSI Design

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Shock and Vibration

Hindawiwww.hindawi.com Volume 2018

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawiwww.hindawi.com

Volume 2018

Hindawi Publishing Corporation http://www.hindawi.com Volume 2013Hindawiwww.hindawi.com

The Scientific World Journal

Volume 2018

Control Scienceand Engineering

Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com

Journal ofEngineeringVolume 2018

SensorsJournal of

Hindawiwww.hindawi.com Volume 2018

International Journal of

RotatingMachinery

Hindawiwww.hindawi.com Volume 2018

Modelling &Simulationin EngineeringHindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawiwww.hindawi.com Volume 2018

Hindawiwww.hindawi.com Volume 2018

Navigation and Observation

International Journal of

Hindawi

www.hindawi.com Volume 2018

Advances in

Multimedia

Submit your manuscripts atwww.hindawi.com